Title :
Distributed Oblivious Transfer with Adaptive Queries
Author :
Jiang, Shuxian ; Li, Hongda ; Li, Bao
Author_Institution :
State Key Lab. of Inf. Security, Chinese Acad. of Sci., Beijing, China
Abstract :
We study Distributed Oblivious Transfer (DOT) scheme in the adaptive version, which means the receiver should ask threshold number of servers to retrieve each secret, and the receiver could adaptively determine which secret would be retrieved and which servers to query. This protocol has both advantages of DOT and adaptive OT, thus inherently has good broad uses. Our first attempt to build such scheme follows the present DOT scheme and considers the semi-honest parties. The second protocol strengthens the security of the first one. It prevents potential malicious behaviors of servers, therefore it is a verifiable distributed oblivious transfer scheme with adaptive queries.
Keywords :
client-server systems; cryptographic protocols; query processing; DOT scheme; adaptive queries; distributed oblivious transfer scheme; receiver; second protocol; servers malicious behaviors; Data security; Distributed computing; Information retrieval; Information security; Laboratories; Mobile communication; Mobile computing; Protection; Protocols; US Department of Transportation; Distributed Oblivious Transfer; Oblivious Transfer; Oblivious Transfer with Adaptive Queries;
Conference_Titel :
Communications and Mobile Computing (CMC), 2010 International Conference on
Conference_Location :
Shenzhen
Print_ISBN :
978-1-4244-6327-5
Electronic_ISBN :
978-1-4244-6328-2
DOI :
10.1109/CMC.2010.338